The post GyoiThon: tool to make penetration testing with Machine Learning appeared first on Information Security Newspaper | Hacking News.
]]>GyoiThon executes steps 1 and 4 automatically. The only operation of the user is to enter the top URL of the target web server in GyoiThon. You can identify vulnerabilities in web servers without so much time and effort.
Step 1. Collect HTTP responses. GyoiThon gathers several HTTP responses from the target website while reviewing the site.
Step 2. Identify the name of the product. The expert comments that GyoiThon identifies the name of the product installed on the web server using the following two methods.
Ejemplo: Etag: “409ed-183-53c5f732641c0”
GyoiThon can identify the Apache web server software. This is because GyoiThon learns Apache features, such as “Etag header value (409ed-183-53c5f732641c0).” Apache uses a combination of lowercase letters and numbers as the Etag value and the Etag value is separated by 4-5. 5 digits and 3-4 digits and 12 digits, the final digit is 0 in many cases.
Example 2: Set-Cookie: f00e68432b68050dee9abe33c389831e=0eba9cd0f75ca0912b4849777677f587;
GyoiThon can identify the CMS Joomla !. This is because GyoiThon learns the features of Joomla! as “Cookie name (f00e6 … 9831e)” and “Cookie value (0eba9 … 7f587).
Example: /core/misc/drupal.js?v=8.3.1
Step 3. Exploit using Metasploit. According to the information security expert, in this step, GyoiThon runs the exploit corresponding to the software identified using Metasploit and checks if the software is affected by the vulnerability.
Step 4. Generate scan report. GyoiThon generates a report that summarizes the vulnerabilities. The style of the report is html.
Operation check environment:
The post GyoiThon: tool to make penetration testing with Machine Learning appeared first on Information Security Newspaper | Hacking News.
]]>